Engine | Download Report | Detection | Info |
---|---|---|---|
|
malicious
|
||
|
malicious
Score: 88
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
|
|
|
malicious
Score: 80
|
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run Condition: Run with higher sleep bypass
|
Name | Detection |
---|---|
https://api.brutalhax.net/ | |
http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsEngineersIncIEEERootCA.cr | |
http://pki-crl.symauth.com/ca_d409a5cb737dc0768fd08ed5256f3633/LatestCRL.crl07 | |
Click to see the 20 hidden entries | |
http://foo/Login.xaml | |
https://api.brutal-hax.net/info/cheat_status.php?hack_id= | |
https://api.brutal-hax.net/Online/set_online_status.php?username= | |
http://foo/bar/login.baml | |
https://api.brutal-hax.net/loader_version.php | |
http://foo/bar/bhicon.png | |
http://defaultcontainer/bhicon.png | |
https://brutal-hax.net/ | |
https://api.brutal-hax.net/loader_get_cheats.php?username= | |
https://api.brutal-hax.net/notification.txt | |
https://api.brutal-hax.net/loader_cheat_info_ex.php?index= | |
http://defaultcontainer/Login.xaml | |
http://foo/bhicon.png | |
https://discord.gg/brutal-hax | |
https://api.brutal-hax.net/Driver/Driver1.8_x64.sys | |
http://pki-ocsp.symauth.com0 | |
https://help.ea.com/en/help/faq/how-to-clean-boot-your-pc/ | |
https://api.brutal-hax.net/loader_statut_new.php | |
https://api.brutal-hax.net/loader_authentification_new.php?username= | |
https://api.brutal-hax.net/Online/get_online_users.php?username= |
Name | File Type | Hashes | Detection |
---|---|---|---|
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_olPUTAxpzu.exe_e22b91f83659b5e64951010ad9cc6d1b32c47_5da1df81_19bd84ad\Report.wer |
Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6D9B.tmp.dmp |
Mini DuMP crash report, 14 streams, Wed Apr 20 22:09:27 2022, 0x1205a4 type | # | |
C:\ProgramData\Microsoft\Windows\WER\Temp\WER759B.tmp.WERInternalMetadata.xml |
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators | # | |
Click to see the 1 hidden entries | |||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7732.tmp.xml |
XML 1.0 document, ASCII text, with CRLF line terminators | # |